These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
215 related articles for article (PubMed ID: 10141386)
1. Is confidentiality of the computerized patient record something that cannot be achieved, and does it really matter? Med Interface; 1995 Mar; 8(3):14-5. PubMed ID: 10141386 [No Abstract] [Full Text] [Related]
2. Preparing for the computerized patient. Record and managing its security. Pierce S J Am Assoc Med Transcr; 1995; 14(3):38-9. PubMed ID: 10142443 [No Abstract] [Full Text] [Related]
3. Commentary: confidentiality of patient information--challenges and opportunities for physicians in using the computerized medical record. Nagle CE Top Health Inf Manage; 1995 Nov; 16(2):72-6. PubMed ID: 10152480 [No Abstract] [Full Text] [Related]
4. Privacy protections afforded by computer-based patient record systems. Amatayakul M Top Health Inf Manage; 1996 May; 16(4):22-7. PubMed ID: 10157658 [TBL] [Abstract][Full Text] [Related]
7. Dialogue. Privacy protection: paper or computer records? Confidentiality of healthcare records. Barrows RC; Clayton PD Behav Healthc Tomorrow; 1996 Feb; 5(1):38, 41, 43-4. PubMed ID: 10158447 [TBL] [Abstract][Full Text] [Related]
8. Standards for confidentiality, privacy, access, and data security. Hanken MA Top Health Inf Manage; 1996 May; 16(4):44-8. PubMed ID: 10157660 [TBL] [Abstract][Full Text] [Related]
9. Legal review: protecting the confidentiality and integrity of patient records. McKenzie DJ Top Health Inf Manage; 1997 May; 17(4):62-71. PubMed ID: 10168994 [TBL] [Abstract][Full Text] [Related]
10. Data security. Morrissey J Mod Healthc; 1996 Sep; 26(40):32-3, 35-8, 40. PubMed ID: 10161903 [No Abstract] [Full Text] [Related]
13. Ending the paper chase. Health plans are weighing the benefits and drawbacks of computer-based patient record systems. Stevens L Healthplan; 1996; 37(6):44-8, 50-1. PubMed ID: 10162985 [No Abstract] [Full Text] [Related]
14. Information technologies need to protect patient confidentiality. Pendrak RF; Ericson RP Healthc Financ Manage; 1998 Oct; 52(10):66-8. PubMed ID: 10187618 [TBL] [Abstract][Full Text] [Related]
15. Data security: how much is enough? Anderson HJ Med Claims Manag; 1993; 1(5):38-45. PubMed ID: 10143650 [No Abstract] [Full Text] [Related]
16. Security considerations when choosing an EMR system. Mendoza E Health Manag Technol; 2003 Oct; 24(10):48. PubMed ID: 14535124 [No Abstract] [Full Text] [Related]
17. Investment appraisal of the protection, confidentiality and security arrangements of patient data. Loftus D; Carroll T Stud Health Technol Inform; 1997; 43 Pt A():186-90. PubMed ID: 10179534 [TBL] [Abstract][Full Text] [Related]
18. The impact of technology on the confidentiality of health information. White AW; Wager KA; Lee FW Top Health Inf Manage; 1996 May; 16(4):13-21. PubMed ID: 10157657 [TBL] [Abstract][Full Text] [Related]
19. Putting a lock on records. Fuller SR Provider; 1997 Jun; 23(6):59-60. PubMed ID: 10168008 [No Abstract] [Full Text] [Related]
20. [Confidentiality of computerized medical records systems]. Eliasson G; Björgell P Lakartidningen; 1995 Jan; 92(1-2):59-60. PubMed ID: 7830466 [No Abstract] [Full Text] [Related] [Next] [New Search]